Breach Data Feedback towards Apt Security Measures

Inyene Udoh, Adewale Adebayo

Abstract


Information is very paramount in our day-to-day lives. Information systems need to be secure in fulfilment of their purposes. There have been failings in information security despite efforts to forestall them. Some needed feedback could be gotten through the analysis of breach data, which the research addressed. Data set of breaches on one of the leading repositories, Privacy Rights Clearinghouse, for the period between November, 1st 2012 and October, 31st 2013 was taken as a cluster and analysed. The analysis revealed that hacking was the most prevalent breach mechanism followed by stolen or lost portable devices and insiders perpetrated more breaches.  Security efforts should focus more on perimeter and user device security and access control, especially in medical organizations. Insights gained from the timely analysis of breach data can help deduce apt security measures.

Keywords: breach data feedback, breach data analysis, security breach, breach countermeasure, security measures.


Full Text: PDF
Download the IISTE publication guideline!

To list your conference here. Please contact the administrator of this platform.

Paper submission email: IKM@iiste.org

ISSN (Paper)2224-5758 ISSN (Online)2224-896X

Please add our address "contact@iiste.org" into your email contact list.

This journal follows ISO 9001 management standard and licensed under a Creative Commons Attribution 3.0 License.

Copyright © www.iiste.org